ETHICAL HACKING - CHAPTER 15 - MC QUESTIONS
Which of the following is most associated with enterprise security access in a wireless network? A. WPA B. 802.1x C. WPA Radius D. TACACS+
B. 802.1x
A closed network is typically which of the following? A. Public network B. Private network C. Hot spot D. Kiosk location
B. Private network
An SSID is used to do which of the following? A. Identify a network. B. Identify clients. C. Prioritize traffic. D. Mask a network
A) Identify a network
Which of the following specifies security standards for wireless? A. 802.11a B. 802.11b C. 802.11g D. 802.11i
D) 802.11i
What is a client‐to‐client wireless connection called? A. Infrastructure B. Client‐server C. Peer‐to‐peer D. Ad hoc
D. Ad hoc
Which feature makes WPA easy to defeat? A. AES encryption B. WPS support (WiFi protected setup) C. TKIP support D. RC4 support
B. WPS support (WiFi protected setup)
WEP is designed to offer security comparable to which of the following? A. Bluetooth B. Wired networks C. IrDA D. IPv6
B. Wired networks
A honeyspot is designed to do what? A. Look for patterns of known attacks. B. Look for deviations from known traffic patterns. C. Attract victims to connect to it. D. Analyze attacks patterns.
C. Attract victims to connect to it.
Monitor mode is used by wireless cards to do what? A. Capture traffic from an associated wireless access point. B. Capture information from ad hoc networks. C. Capture information about wireless networks. D. Capture traffic from access points.
C. Capture information about wireless networks.
Warchalking is used to do which of the following? A. Discover wireless networks. B. Hack wireless networks. C. Make others aware of a wireless network. D. Analyze a wireless network.
C. Make others aware of a wireless network.
As a security administrator, you have security concerns regarding the plans to utilize wireless networks to bridge different corporate offices. Due to the location of these offices, traditional connections are cost prohibitive. Which of the following antennas will provide the best coverage while limiting the probability of unwanted signal interception? A. Omni B. Fan C. Yagi D. Satellite dish
C. Yagi
How many characters does a service set identifier (SSID) contain? A. 32 B. 64 C. 20 D. 128
A) 32
Which of the following operates at 5 GHz? A. 802.11a B. 802.11b C. 802.11g D. 802.11i
A) 802.11a
When a wireless client is attached to an access point, it is known as which of the following? A. Network Infrastructure B. Client‐server C. Peer‐to‐peer D. Ad hoc
A) Network Infrastructure
What is a rogue access point? A. An access point not managed by a company B. An unmanaged access point C. A second access point D. A honeypot device
A. An access point not managed by a company
AirPcap is used to do which of the following? A. Assist in the sniffing of wireless traffic. B. Allow network traffic to be analyzed. C. Allow the identification of wireless networks. D. Attack a victim.
A. Assist in the sniffing of wireless traffic.
The wardriving process involves which of the following? A. Locating wireless networks B. Breaking into wireless networks C. Sniffing traffic D. Performing spectrum analysis
A. Locating wireless networks
Which of the following is designed to locate wireless access points? A. Site survey B. Traffic analysis C. Pattern recognition D. Cracking
A. Site survey
Which of the following options shows the protocols in order from strongest to weakest? A. WPA, WEP, WPA2, Open B. WEP, WPA2, WPA, Open C. Open, WPA, WPA2, WEP D. WPA2, WPA, WEP, Open
D. WPA2, WPA, WEP, Open
Which of the following is a device used to perform a DoS on a wireless network? A. WPA jammer B. WPA2 jammer C. WEP jammer D. Wi‐Fi jammer
D. Wi‐Fi jammer